pix# sh run : Saved : PIX Version 6.3(3) interface ethernet0 10baset interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password KP encrypted passwd m.G encrypted hostname pix domain-name ad.org fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list if_inside permit ip 10.1.1.0 255.255.255.0 any access-list if_outside permit icmp any any echo-reply access-list if_outside permit icmp any any time-exceeded access-list if_outside permit icmp any any access-list if_outside permit tcp any host 216.139.145.163 eq smtp access-list if_outside permit tcp any host 216.139.145.163 eq www access-list if_outside permit tcp any host 216.139.145.163 eq https access-list if_outside permit tcp any host 216.139.145.163 eq pop3 access-list if_outside permit tcp any host 216.139.145.163 eq ssh access-list if_outside permit tcp any host 216.139.145.163 eq 993 access-list if_outside permit udp any host 216.139.145.163 eq 993 access-list if_outside permit tcp any host 216.139.145.163 eq 3283 access-list if_outside permit tcp any host 216.139.145.163 eq 5900 access-list if_outside permit udp any host 216.139.145.163 eq 3283 access-list if_outside permit udp any host 216.139.145.163 eq 5900 access-list admin_tunnelACL permit ip 10.1.1.0 255.255.255.0 any pager lines 24 icmp permit any echo outside icmp permit any echo-reply outside icmp permit any echo-reply inside icmp permit any echo inside mtu outside 1500 mtu inside 1500 ip address outside 16.39.45.62 255.255.255.248 ip address inside 10.1.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool vpndhcp 10.1.1.50-10.1.1.60 pdm location 10.1.1.0 255.255.255.0 inside pdm location 10.1.1.5 255.255.255.255 inside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 10.1.1.0 255.255.255.0 0 0 static (inside,outside) 16.39.45.63 10.1.1.5 netmask 255.255.255.255 0 0 access-group if_outside in interface outside access-group if_inside in interface inside route outside 0.0.0.0 0.0.0.0 16.39.45.61 1 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 10.1.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public snmp-server enable traps floodguard enable sysopt connection permit-ipsec sysopt connection permit-l2tp sysopt ipsec pl-compatible crypto ipsec transform-set vpnset esp-des esp-sha-hmac crypto map vpnmap 3 ipsec-isakmp crypto map vpnmap 3 set pfs group2 crypto map vpnmap 3 set peer 80.235.84.114 crypto map vpnmap 3 set transform-set vpnset ! Incomplete crypto map vpnmap interface outside isakmp enable outside isakmp key ******** address 80.35.4.14 netmask 255.255.255.255 no-xauth no-config-mode isakmp identity address isakmp policy 8 authentication pre-share isakmp policy 8 encryption des isakmp policy 8 hash sha isakmp policy 8 group 2 isakmp policy 8 lifetime 86400 vpngroup admin address-pool vpndhcp vpngroup admin dns-server 10.1.1.5 vpngroup admin wins-server 10.1.1.5 vpngroup admin default-domain ad.org vpngroup admin split-tunnel admin_tunnelACL vpngroup admin idle-time 1800 vpngroup admin password ******** vpngroup split-tunnel idle-time 1800 telnet 0.0.0.0 0.0.0.0 inside telnet timeout 20 ssh 0.0.0.0 0.0.0.0 outside ssh 0.0.0.0 0.0.0.0 inside ssh timeout 60 console timeout 0 dhcpd lease 3600 dhcpd ping_timeout 750 terminal width 80 Cryptochecksum:00d85ed1e09666a85f432 : end pix#